Which option in a firewall rule would only match and allow traffic to VPN gateways for one Community in common?
Security Gateway software blades must be attached to what?
What are the three components for Check Point Capsule?
Stateful Inspection compiles and registers connections where?
By default, which port is used to connect to the GAiA Portal?
Which Threat Prevention Software Blade provides protection from malicious software that can infect your network computers? (Choose the best answer.)
Name one limitation of using Security Zones in the network?
Please choose correct command syntax to add an “emailserver1” host with IP address 10.50.23.90 using GAiA management CLI?
AdminA and AdminB are both logged in on SmartConsole What does it mean if AdmmB sees a lock icon on a rule? Choose the BEST answer.
Which of the following describes how Threat Extraction functions?
Session unique identifiers are passed to the web api using which http header option?
Which type of Check Point license is tied to the IP address of a specific Security Gateway and cannot be transferred to a gateway that has a different IP address?
Which command shows the installed licenses?
In SmartConsole, objects are used to represent physical and virtual network components and also some logical components. These objects are divided into several categories. Which of the following is NOT an objects category?
Fill in the blank: The position of an implied rule is manipulated in the __________________ window.
An administrator is creating an IPsec site-to-site VPN between his corporate office and branch office. Both offices are protected by Check Point Security Gateway managed by the same Security Management Server (SMS). While configuring the VPN community to specify the pre-shared secret, the administrator did not find a box to input the pre-shared secret. Why does it not allow him to specify the pre-shared secret?
Which one of the following is a way that the objects can be manipulated using the new API integration in R80 Management?
Which SmartConsole application shows correlated logs and aggregated data to provide an overview of potential threats and attack patterns?
Which of the following is NOT an option to calculate the traffic direction?
How would you determine the software version from the CLI?
Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.
How do you manage Gaia?
Which key is created during Phase 2 of a site-to-site VPN?
R80.10 management server can manage gateways with which versions installed?
To increase security, the administrator has modified the Core protection ‘Host Port Scan’ from ‘Medium’ to ‘High’ Predefined Sensitivity. Which Policy should the administrator install after Publishing the changes?
SmartConsole provides a consolidated solution for everything that is necessary for the security of an organization, such as the following
John is using Management HA. Which Smartcenter should be connected to for making changes?
Fill in the blank: An LDAP server holds one or more ______________.
The Gateway Status view in SmartConsole shows the overall status of Security Gateways and Software Blades. What does the Status Attention mean?
What is the most complete definition of the difference between the Install Policy button on the SmartConsole’s tab, and the Install Policy within a specific policy?
Name the utility that is used to block activities that appear to be suspicious.
When an Admin logs into SmartConsole and sees a lock icon on a gateway object and cannot edit that object, what does that indicate?
After a new Log Server is added to the environment and the SIC trust has been established with the SMS what will the gateways do?
Which of the following is NOT a policy type available for each policy package?
Which option, when applied to a rule, allows all encrypted and non-VPN traffic that matches the rule?
When a Security Gateways sends its logs to an IP address other than its own, which deployment option is installed?
Which of the following is an identity acquisition method that allows a Security Gateway to identify Active Directory users and computers?
If there are two administrators logged in at the same time to the SmartConsole, and there are objects locked for editing, what must be done to make them available to other administrators? Choose the BEST answer
You have successfully backed up your Check Point configurations without the OS information. What command would you use to restore this backup?
Name the authentication method that requires token authenticator.
How can the changes made by an administrator before publishing the session be seen by a superuser administrator?
Which of the following is NOT a type of Endpoint Identity Agent?
Which statement is NOT TRUE about Delta synchronization?
Fill in the blank: The_____is used to obtain identification and security information about network users.
Which of the following is considered a "Subscription Blade", requiring renewal every 1-3 years?
Traffic from source 192.168.1.1 is going to The Application Control Blade on the gateway is inspecting the traffic. Assuming acceleration is enable which path is handling the traffic?
Which path below is available only when CoreXL is enabled?
How many users can have read/write access in Gaia Operating System at one time?
The SmartEvent R80 Web application for real-time event monitoring is called:
Which policy type is used to enforce bandwidth and traffic control rules?
Fill in the blanks: Default port numbers for an LDAP server is ______ for standard connections and _______ SSL connections.
What is the SOLR database for?
By default, which port does the WebUI listen on?
The SIC Status “Unknown” means
What are the steps to configure the HTTPS Inspection Policy?
What command would show the API server status?
Fill in the blanks: In _____ NAT, Only the ________ is translated.
How is communication between different Check Point components secured in R80? As with all questions, select the best answer.
After trust has been established between the Check Point components, what is TRUE about name and IP-address changes?
The CDT utility supports which of the following?
Which option would allow you to make a backup copy of the OS and Check Point configuration, without stopping Check Point processes?
The Network Operations Center administrator needs access to Check Point Security devices mostly for troubleshooting purposes. You do not want to give her access to the expert mode, but she still should be able to run tcpdump. How can you achieve this requirement?
Choose what BEST describes the reason why querying logs now are very fast.
You are the Check Point administrator for Alpha Corp with an R80 Check Point estate. You have received a call by one of the management users stating that they are unable to browse the Internet with their new tablet connected to the company Wireless. The Wireless system goes through the Check Point Gateway. How do you review the logs to see what the problem may be?
You want to verify if there are unsaved changes in GAiA that will be lost with a reboot. What command can be used?
What licensing feature is used to verify licenses and activate new licenses added to the License and Contracts repository?
From SecureXL perspective, what are the tree paths of traffic flow:
Fill in the blank: Once a certificate is revoked from the Security Gateway by the Security Management Server, the certificate information is _____.
Which of the following methods can be used to update the trusted log server regarding the policy and configuration changes performed on the Security Management Server?
Which tool allows you to monitor the top bandwidth on smart console?
Identify the ports to which the Client Authentication daemon listens on by default?
Which Threat Prevention Software Blade provides comprehensive protection against malicious and unwanted network traffic, focusing on application and server vulnerabilities?
Fill in the blank: ____________ is the Gaia command that turns the server off.
What is the purpose of a Clean-up Rule?
You can see the following graphic:
What is presented on it?
Full synchronization between cluster members is handled by Firewall Kernel. Which port is used for this?
Which of the following is NOT an authentication scheme used for accounts created through SmartConsole?
Which back up method uses the command line to create an image of the OS?
While enabling the Identity Awareness blade the Identity Awareness wizard does not automatically detect the windows domain Why does it not detect the windows domain?
Fill in the blank: To create policy for traffic to or from a particular location, use the _____________.
True or False: In a Distributed Environment, a Central License can be installed via CLI on a Security Gateway
What is the default shell for the command line interface?
Which default Gaia user has full read/write access?
If there is an Accept Implied Policy set to "First", what is the reason Jorge cannot see any logs?
What kind of NAT enables Source Port Address Translation by default?
Aggressive Mode in IKEv1 uses how many packages for negotiation?
Which of the following commands is used to monitor cluster members?
What is required for a certificate-based VPN tunnel between two gateways with separate management systems?
What are the advantages of a “shared policy” in R80?
Which configuration element determines which traffic should be encrypted into a VPN tunnel vs. sent in the clear?
Fill in the blank: An identity server uses a ___________ for user authentication.
Which software blade enables Access Control policies to accept, drop, or limit web site access based on user, group, and/or machine?
Identity Awareness lets an administrator easily configure network access and auditing based on three items Choose the correct statement.
Which of the completed statements is NOT true? The WebUI can be used to manage Operating System user accounts and
When should you generate new licenses?
You have discovered suspicious activity in your network. What is the BEST immediate action to take?
When connected to the Check Point R80 Management Server using the SmartConsole the first administrator to connect has a lock on:
How Capsule Connect and Capsule Workspace differ?
Choose what BEST describes users on Gaia Platform.
When configuring Spoof Tracking, which tracking actions can an administrator select to be done when spoofed packets are detected?
What are the three main components of Check Point security management architecture?
Which is a main component of the Check Point security management architecture?
You had setup the VPN Community NPN-Stores' with 3 gateways. There are some issues with one remote gateway(l .1.1.1) and an your local gateway. What will be the best log filter to see only the IKE Phase 2 agreed networks for both gateways.
Application Control/URL filtering database library is known as:
Which Check Point software blade monitors Check Point devices and provides a picture of network and security performance?
In what way is Secure Network Distributor (SND) a relevant feature of the Security Gateway?
What are the Threat Prevention software components available on the Check Point Security Gateway?
What is NOT an advantage of Packet Filtering?
Gaia includes Check Point Upgrade Service Engine (CPUSE), which can directly receive updates for what components?
Which of the following is true about Stateful Inspection?
What is the purpose of Captive Portal?
In a Distributed deployment, the Security Gateway and the Security Management software are installed on what platforms?
Fill in the blank: An Endpoint identity agent uses a ___________ for user authentication.
What is NOT an advantage of Stateful Inspection?
At what point is the Internal Certificate Authority (ICA) created?
Which of the following is TRUE regarding Gaia command line?
Which of the following commands is used to monitor cluster members in CLI?
What SmartEvent component creates events?
Which icon in the WebUI indicates that read/write access is enabled?
Fill in the blank Backup and restores can be accomplished through
Name the file that is an electronically signed file used by Check Point to translate the features in the license into a code?
What is the user ID of a user that have all the privileges of a root user?
Which tool is used to enable ClusterXL?